Page 10 - Threat Intelligence 8-16-2019
P. 10

Social Engineering










              Social Security scams could rise following Capital One breach - The Capital One data breach
              Opens a New Window. is stoking fears about a new wave of Social Security scams Opens a New
              Window. , which have been on a precipitous rise in 2019.As first reported by The Wall Street
              Journal, thieves could exploit the event to go after vulnerable victims. Social Security scams have
              overtaken IRS imposter scams this year, becoming one of the most prevalent thievery attempts.
              According to Capital One, about 140,000 Social Security numbers belonging to its credit card
              customers could have been compromised. However, scammers do not need your Social Security
              information in order to carry out their schemes. According to the Federal Trade Commission (FTC),
              the most common Social Security scams involve imposters telling consumers their Social Security
              numbers were suspended because of suspicious activity, after which victims are asked to confirm
              their numbers.

                      Source: https://www.foxbusiness.com/personal-finance/social-security-scams-capital-one



              DHS warns of potential cyber scams tied to El Paso, Dayton shootings - The Department of
              Homeland Security (DHS) on Tuesday warned internet users to watch out for potential “malicious
              cyber activity” that seeks to take advantage of the shootings over the weekend in El Paso, Texas,
              and Dayton, Ohio. Specifically, DHS’s Cybersecurity and Infrastructure Security Agency (CISA)
              recommended that users should “exercise caution” in opening emails or email attachments that
              refer to either of the shooting incidents, which together led to the deaths of more than 30 people
              and to dozens of injuries. CISA noted that these emails and attachments could direct users to
              malware-infected websites.

                      Source: https://thehill.com/policy/cybersecurity/456440-dhs-warns-of-potential-cyber-
                      scams-tied-to-el-paso-dayton-shootings



              APT34 spread malware via LinkedIn invites - FireEye researchers identified a phishing campaign
              conducted by the cyberespionage group APT34 masquerading as a member of Cambridge
              University to gain their victim’s trust to open malicious documents. Researchers noticed the
              campaign in late June 2019 using LinkedIn professional network invitations to deliver the malicious
              documents that included the use of three new malware families according to a July 18 blog post.

                      Source: https://www.scmagazine.com/home/security-news/apts-cyberespionage/fireeye-
                      researchers-identified-a-phishing-campaign-conducted-by-apt34-masquerading-as-a-
                      member-of-cambridge-university-to-gain-their-victims-trust-to-open-malicious-
                      documents/















                                                    www.accumepartners.com
                                                                                                                    10
   5   6   7   8   9   10   11   12   13   14   15